3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (1)

It sounds more like science fiction than reality, but Swiss newspaperAargauer Zeitungreported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets -- transformed into soldiers in a botnet army -- allegedly knocked out a Swiss company for several hours, costing millions of euros in damages.

Or, did they? Sources, such as Bleeping Computerand Bleeping Media, found it hard to credit this toothsome tale. And now the security companyFortinet, which helped give the original story credence, is admitting that mistakes were made.

In a note to ZDNET, a Fortinet representative said, "To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears ... the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred."

Also: Do you love or fear your smart home devices? For most Americans, it's both

The story had claimed that the compromised toothbrushes were running Java, a popular language for Internet of Things (IoT) devices. Once infected, a global network of malicious toothbrushes supposedly launched their successful attack.

The repurposed toothbrushes supposedly accomplished this by flooding the Swiss website with bogus traffic, effectively knocking services offline and causing widespread disruption.

Although this story wasn't real, the episode underlines the ever-expanding threat landscape as the IoT becomes increasingly embedded in our daily lives. "Smart" toothbrushes are now 10 years old. Devices that once seemed harmless and disconnected from the digital ecosystem are now potential entry points for cybercriminals. The implications are vast, not only for individual privacy and security but also for national infrastructure and economic stability.

As Stefan Zuger, director of system engineering in Fortinet's Swiss office, said, "Every device that is connected to the Internet is a potential target – or can be misused for an attack."

Anyone paying close attention to cybersecurity has known about this threat for years. As James Clapper, former US Director of National Intelligence, told us in 2016: "Devices, designed and fielded with minimal security requirements and testing, and an ever-increasing complexity of networks could lead to widespread vulnerabilities in civilian infrastructures and US government systems."

It's no longer "could." We're now living in homes filled with insecure IoT devices.

Also:This company says AI can help design sustainable smart home appliances

Why? As Mark Houpt, data center operator DataBank chief information security officer, explained, it's because many IoT devices are inherently insecure for two key reasons: Neglect and the lack of an interface upon which to add security and hardening measures. I mean, exactly how do you control your toothbrush's security setting? How do you add an antivirus program to your refrigerator?

You can't.

So, what can you do?

Well, for starters, as Zuger said, you can automatically update all your devices whenever an update is available "You can't update enough."

Also:The best smart home devices, tested and reviewed

You should also never charge your device at a public USB port. That same port that charges your gadget can also infect it.

I also suggest paying attention if your device suddenly starts losing power faster than normal. Sure, it may just be an aging battery, but it also could be malware running in the background.

You should also be wary of public Wi-Fi connections. The same connection that lets you watch a TikTok may also be loading malware on your smartphone.

While at your home, I urge you to set up a firewall on your Internet connection. If an attacker can't get to your smart toilet, it can't infect it. And, boy, isn't a malware-infected toilet an ugly thought?

Also: The best smart TVs you can buy

Finally -- and I'm quite serious about this -- don't buy an IoT-enabled device unless you have a real need for it. A smart TV? Sure, how else are you going to stream the Super Bowl? But a washing machine, an iron, a toothbrush? No. Just say no.

As we forge ahead into an increasingly connected future, let's ensure that our digital hygiene is as robust as our dental hygiene.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next
3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen (2024)

FAQs

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen? ›

A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack.

Were 3 million smart toothbrushes used in a DDoS attack really? ›

Hackers didn't hack your smart toothbrush. What's happening: Swiss outlet Aargauer Zeitung published a story last week claiming that hackers had launched a distributed denial-of-service (DDoS) attack against roughly 3 million internet-connected toothbrushes, causing damage to the tune of millions of euros.

Were toothbrushes used in a DDoS attack? ›

Update 2 — 2/9/2024 6:30am PT: The security company at the nexus of the original report that three million toothbrushes were used in a DDOS attack has now retracted the story and claimed it was a result of a mistranslation — but according to the news outlet that published the initial report, that statement isn't true.

Were hacked toothbrushes used in cyber attack? ›

That's fiction. Last week, a Swiss-German news site published a story that three million smart toothbrushes had been hacked to conduct attacks against a company. But that wasn't the case. It was actually a hypothetical scenario, although cyber security experts say it is possible.

What are 3 reasons for DDoS attacks? ›

DDoS attacks can have many other motivations including political, hacktivist, terrorist, and business competition. Anyone with a financial or ideological motive can damage an organization by launching a DDoS attack against it.

What is the most powerful DDoS attack? ›

The Largest Reported HTTP DDoS attack, 2023

In February 2023, Cloudflare reported identifying and successfully mitigating the most colossal DDoS attack to date. This attack registered a staggering 71 million requests per second, surpassing the previous record of 46 million RPS set in June 2022 by over 54%.

Is DDoS a real thing? ›

A distributed denial-of-service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource. Both types of attacks overload a server or web application with the goal of interrupting services.

Why are DDoS attacks illegal? ›

The cumulative effect of DDoS attacks makes them substantially more destructive to web servers. DDoS attacks are severely detrimental to an online business because they completely stop the flow of traffic or slow a website down to the point of it being unusable.

What does DDoS do to WIFI? ›

Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are malicious attempts to disrupt the normal operations of a targeted server, service, or network by overwhelming it with a flood of Internet traffic.

Who is the victim of DDoS attack? ›

DDoS attacks are usually only likely to affect business owners – particularly people in charge of large computer networks. However, they can also affect small businesses, blogs or personal websites. They might also bring down services that you depend on, like banking or email servers.

How are 3 million hacked toothbrushes? ›

So as it turns out, 3 million smart toothbrushes were not hacked, and everything you read on the internet is, in fact, not true! But … it certainly could happen, so make sure you are protecting any smart devices you have, and keep in mind that everything you own doesn't have to be smart.

Can a toothbrush be hacked? ›

Stefan Zuger from Fortinet advises protecting devices against malware and suspicious activity to stay safe from cybercriminals. Hackers have reportedly used millions of toothbrushes to launch a DDoS attack.

How do hackers pick their victims? ›

Cybercriminals rarely choose their victims at random. The first stage of the cyber kill chain is reconnaissance, where an attacker narrows down a list of targets based on organization profile, security posture, and vulnerable individuals.

Is DDoS a threat or risk? ›

Certain industries, such as gaming, ecommerce, and telecommunications, are targeted more than others. DDoS attacks are some of the most common cyberthreats, and they can potentially compromise your business, online security, sales, and reputation.

Are DDoS attacks hard to prevent? ›

The collective power of this compromised network of devices makes it challenging to defend against because it can overwhelm even the most robust network infrastructure and security measures. Not only does a DDoS attack increase the attack power, it also makes it harder to identify the true source of the attack.

Why are DDoS attacks so bad? ›

During an attack, no employees are able to access network resources, and in the case of Web servers running eCommerce sites, no consumers will be able to purchase products or receive assistance. The dollar figure varies, but companies can lose $20,000 per hour in the event of a successful attack.

Were three million smart toothbrushes allegedly being used in a botnet? ›

A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack.

What is a real world example of a DDoS attack? ›

One of the largest verifiable DDoS attacks on record targeted GitHub, a popular online code management service used by millions of developers. This attack reached 1.3 Tbps, sending packets at a rate of 126.9 million per second. The GitHub attack was a memcached DDoS attack, so there were no botnets involved.

What is the CIA triad for DDoS attacks? ›

CIA Triad and DDoS Attack

In cybersecurity, we think of the CIA triad in terms of types of attacks: Confidentiality: Is my information secret? Integrity: Is my information accurate and trustworthy? Availability: Can I get my information when and where I need it?

What is the oldest DDoS attack? ›

A Brief History of DDoS Attacks

The first known distributed denial of service attack occurred in 1996 when Panix, now one of the oldest internet service providers, was knocked offline for several days by a SYN flood, a technique that has become a classic DDoS attack.

References

Top Articles
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 6480

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.